Improper Neutralization Affecting cloudwatch-exporter package, versions <0.15.4-r3


Severity

Recommended
0.0
medium
0
10

Snyk's Security Team recommends NVD's CVSS assessment. Learn more

Threat Intelligence

EPSS
0.22% (61st percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-CHAINGUARDLATEST-CLOUDWATCHEXPORTER-5915642
  • published22 Sept 2023
  • disclosed15 Sept 2023

Introduced: 15 Sep 2023

CVE-2023-36479  (opens in a new tab)
CWE-149  (opens in a new tab)

How to fix?

Upgrade Chainguard cloudwatch-exporter to version 0.15.4-r3 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream cloudwatch-exporter package and not the cloudwatch-exporter package as distributed by Chainguard. See How to fix? for Chainguard relevant fixed versions and status.

Eclipse Jetty Canonical Repository is the canonical repository for the Jetty project. Users of the CgiServlet with a very specific command structure may have the wrong command executed. If a user sends a request to a org.eclipse.jetty.servlets.CGI Servlet for a binary with a space in its name, the servlet will escape the command by wrapping it in quotation marks. This wrapped command, plus an optional command prefix, will then be executed through a call to Runtime.exec. If the original binary name provided by the user contains a quotation mark followed by a space, the resulting command line will contain multiple tokens instead of one. This issue was patched in version 9.4.52, 10.0.16, 11.0.16 and 12.0.0-beta2.

CVSS Scores

version 3.1